Current ibm c2180 401 certification exam pdf

Page 1

Vendor

: IBM

Exam Code : C2180-401

Version: Demo

Cheat-Test, help you pass any IT exam!


Cheat-Test.com - The Worldwide Renowned IT Certification Material Provider! The safer, easier way to help you pass any IT Certification exams.

We provide high quality IT Certification exams practice questions and answers (Q&A). Especially Cisco, Microsoft, HP, IBM, Oracle, CompTIA, Adobe, Apple, Citrix, EMC, Isaca, Avaya, SAP and so on. And help you pass an IT Certification exams at the first try.

Cheat-Test product Features: •

Verified Answers Researched by Industry Experts

Questions updated on regular basis

Like actual certification exams our product is in multiple-choice questions (MCQs).

Our questions and answers are backed by our GUARANTEE.

7x24 online customer service: contact@cheat-test.com

Click Here to get more Free Cheat-Test Certification exams!

http://www.Cheat-Test.com


Q: 1 While monitoring a cluster in the cell, the administrator notices that one server in the cluster periodically loses connections to the database. When this happens, requests to the server have a significantly decreased response time and various error conditions are listed in the log files for the server. Since the error codes are returned quickly, the server starts returning responses faster than the average service times for the application. Due to this, the weight for the server is increased and a large percentage of incoming requests are being routed to the erroneous server and the server is getting overloaded with requests. How can the administrator detect these conditions in the future and take action to prevent this problem? A. Configure the storm drain health policy. B. Configure the on demand router (ODR) transport chain to tune inbound connections. C. Monitor the JVM heap usage to determine a new server weight. D. Enable the PMI Extended statistic set and use the Connection Pool summary report. Answer: D Q: 2 The application placement controller has been configured with elasticity mode enabled. Intermittently, all instances of a dynamic cluster are removed. After further review, the system administrator noticed that it occurs during peak load on another dynamic cluster. The administrator wants to keep at least one instance available. Which configuration is needed in the dynamic clusters? A. Enable application lazy start with elasticity mode. B. Set theproactiveldleStopcustom property to true C. Set the Number of instances to a value greater than zero. D. Disable the option"If other dynamic clusters need resources, stop all instances of this cluster during periods of inactivity". Answer: D Q: 3 An application contains a web services client and the application is deployed and running. A system administrator has to add a response timeout to the deployed web services client, so the call fails in a timely fashion. Which artifact should the administrator use? A. web.xml B. was-webservices-sca.xml C. ibm-webservices-bnd.xmi D. ibm-webservicesclient-bnd.xmi Answer: C Q: 4 After installing an enhanced EAR in a WebSphere Application Server environment, a system administrator with Configurator privileges is able to see a JDBC provider and a data source in the Integrated Solution Console (ISC) but is not able to delete these resources. How can the administrator resolve this issue? A. Use the AdminTask object to delete the resources. B. Stop all application server instances and then delete the resources. C. Ask another administrator with iscadmin privilege to delete the resource. D. Edit the EAR to remove the application scoped resources and reinstall the application. Answer: A


Q: 5 A system administrator is configuring the security of a new environment. The administrator has been asked to configure one LDAP server that has different sub-trees for business users and administration users. What should the administrator do to implement the required security configuration? A. Install and configure a TAI (Trust Association Interceptor) B. Configure a security domain for the stand-alone LDAP server. C. Use Federated repositories and configure the supported entity types. D. Use Stand-alone custom registry and configure the flat file implementation. Answer: C Q: 6 A web application was deployed on a WebSphere Application Server cluster. While users are using the application, one of the cluster servers fails and the users lose their working data. What can the system administrator configure to ensure users can continue to work if one of the cluster server fails? A. An increased session timeout. B. A cluster of external HTTP servers. C. A load balancer to spread work between existing servers. D. A WebSphere eXtreme Scale HTTP session management. Answer: D Q: 7 A web application has a configured session timeout of eight hours and a default LTPA token timeout of two hours. After every two hours, the users have to log in again from their HTTP browser. The system administrator is required to make configuration changes so users only have to log in once, while keeping the above mentioned timeouts the same. The authentication mechanism available is Kerberos. How should the administrator do this? A. Configure the SIP digest authentication. B. Configure the SPNEGO Web or SPNEGO TAI. C. Enable Session Management Security Integration. D. Ensure Web Inbound security attribute propagation is enabled. Answer: A Q: 8 How can a system administrator secure a WebSphere Application Server environment to ensure that an application code will not be allowed to access any files in the server's file system? A. Configure the CSIv2 outbound communications under RMI/IIOP security. B. Configure the file-based repository and create the fileRegistry.xml file. C. Enable Java 2 security and configure the app.policy and was .policy files. D. Use the AdminTask deleteAuthorizationGroup to remove application access. Answer: C


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.